TITLE

You can't `Circle X' a deadlined computer

AUTHOR(S)
Conti, Gregory J.
PUB. DATE
October 1994
SOURCE
Military Intelligence Professional Bulletin;Oct/Dec94, Vol. 20 Issue 4, p47
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Offers tips for military intelligence officers on maintenance and repair of computers being used in deployment. Printers; Communication; Power; Backups.
ACCESSION #
9603204494

 

Related Articles

  • Call for Backup!  // Fortune;1/1/2000 Special Issue, Vol. 141 Issue 1, p98 

    Presents options for backing up whole computer systems or a few key files. Rewritable optical media as a storage solution for home and office; Cost of using DVD-RAM, CD-RW, Zip, and Superdisk drives for backups.

  • mastering computers. Goldsborough, Reid // Tech Directions;Sep2004, Vol. 64 Issue 2, p10 

    This article discusses about computer maintenance. Normally we think of maintenance as a chore, something we have to do to keep things running smoothly and prevent problems down the road, whether with our car, house, or computer. But with a personal computer, maintenance can actually be fun--if...

  • Vanquish Windows Worries. Bass, Steve // PC World;Apr2001, Vol. 19 Issue 4, p84 

    Offers advice regarding the Microsoft Windows computer operating system. Suggestions for dealing with computer viruses, retrieving deleted files and invalid page fault messages; Instructions for troubleshooting. INSET: Battle the Enigmatic Blue Screen of Death.

  • U.S. Army Intelligence and the information age. Buppert, William E. // Military Intelligence Professional Bulletin;Jul-Sep95, Vol. 21 Issue 3, p46 

    Reports on the impact of the information age on the United States Army. Applications of automation in various aspects of intelligence gathering; Example; All-Source Analysis System (ASAS); Joint Surveillance Target Attack Radar System (Joint STARS); Emphasis on the role of decisionmakers and...

  • Warrior: The future intelligence picture--now. Norris, Alan; Reese, Kenneth // Military Intelligence;Jul-Sep93, Vol. 19 Issue 3, p19 

    Describes the Warrior computer system, an intelligence processing system used by the US Army. Access and display of information; Ability to interface with communication links; Flexibility of operation either in the stand-alone mode or local area network.

  • 24th ID(M) ace in Operation Desert Capture II. Guillory, Russell A. // Military Intelligence Professional Bulletin;Jul-Sep94, Vol. 20 Issue 3, p9 

    Focuses on the use of the Analysis and Control Element (ACE) in Operation Desert Capture II, a Training and Doctrine Command-approved Concept Evaluation Program initiative of the United States Army. Direction of the Unmanned Aerial Vehicle pilot at the Ground Control Station to follow the...

  • Imagery intelligence at echelons above corps. Clegg, Robert H. // Military Intelligence;Apr-Jun92, Vol. 18 Issue 2, p20 

    Describes the role of the Joint Imagery Production Center (JIPC) during Operations Desert Shield and Desert Storm. Synergism in the use of imagery sensors on various platforms; JIPC organization; Contributions to battlefield operations; Architecture of intelligence flow.

  • Babel on the Wires. Bandman, John // Securities Industry News;5/23/2005, Vol. 17 Issue 20, p34 

    Discusses the challenges posed by the monitoring of global transactions involving money launderers and terrorist financiers by the U.S. federal government under the Intelligence Reform Act. Problems associated with the translation of Arabic names into English; Difficulty of deciphering the...

  • New-Age Intel.  // Defense Technology International;May2012, Vol. 6 Issue 5, p35 

    The article discusses the challenge posed by separating actionable military intelligence from reams of data. It presents information on several unmanned aerial systems (UAS) that are being used by the U.S. Army to collect intelligence. It features Great Britain's DataMan system which is aimed at...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics